Page MenuHomeFreeBSD

pf: Do not hold PF_RULES_RLOCK while processing Ethernet rules
ClosedPublic

Authored by kp on Aug 31 2021, 8:24 AM.
Tags
None
Referenced Files
Unknown Object (File)
Sun, Aug 24, 4:20 PM
Unknown Object (File)
Thu, Aug 14, 11:49 PM
Unknown Object (File)
Thu, Aug 14, 11:14 AM
Unknown Object (File)
Wed, Aug 6, 6:34 PM
Unknown Object (File)
Wed, Aug 6, 4:59 AM
Unknown Object (File)
Jul 23 2025, 7:19 PM
Unknown Object (File)
Jul 22 2025, 3:25 PM
Unknown Object (File)
Jul 20 2025, 1:12 AM

Details

Summary

Avoid the overhead of acquiring a (read) RULES lock when processing the
Ethernet rules.
We can get away with that because when rules are modified they're staged
in V_pf_keth_inactive. We take care to ensure the swap to V_pf_keth is
atomic, so that pf_test_eth_rule() always sees either the old rules, or
the new ruleset.

We need to take care not to delete the old ruleset until we're sure no
pf_test_eth_rule() is still running with those. We accomplish that by
using NET_EPOCH_CALL() to actually free the old rules.

Sponsored by: Rubicon Communications, LLC ("Netgate")

Diff Detail

Repository
rS FreeBSD src repository - subversion
Lint
Lint Passed
Unit
No Test Coverage
Build Status
Buildable 41833
Build 38721: arc lint + arc unit

Event Timeline

Why the use of ck_* instead of atomic_*?

In D31739#776252, @mjg wrote:

Why the use of ck_* instead of atomic_*?

That'd probably work too, but we typically use the ck_* functions in combination with epoch. For example, in ifnet_byindex() or prison_ip_check().

This revision was not accepted when it landed; it landed in state Needs Review.Mar 2 2022, 4:01 PM
This revision was automatically updated to reflect the committed changes.